Static task
static1
Behavioral task
behavioral1
Sample
d4abf0f758284f5bfd40cb3e68dcd44d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4abf0f758284f5bfd40cb3e68dcd44d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4abf0f758284f5bfd40cb3e68dcd44d_JaffaCakes118
-
Size
456KB
-
MD5
d4abf0f758284f5bfd40cb3e68dcd44d
-
SHA1
576f44c36693699a0ebe5c4a222083e997214c07
-
SHA256
bfaf1a1ed3e2ada6cc4bb95bc09167a335731e9048a5ee3e2caf643b75fb37f4
-
SHA512
1f1da24f689bc12ab4a6c282ff906448b2e70595eaf6b516a451b4bf48ef54d9984d8f6a3123c2c35a9112bd813e5e71e2ee79fecdc168715df9780bd0d6c822
-
SSDEEP
12288:GtMTexVNN/Gb3d9M9Iny86G2lxJdsBndGN4rwAwTS:9q/Y9ya4G2YBndGbA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4abf0f758284f5bfd40cb3e68dcd44d_JaffaCakes118
Files
-
d4abf0f758284f5bfd40cb3e68dcd44d_JaffaCakes118.exe windows:4 windows x86 arch:x86
979c46828d5561eb832e07f8364f0a06
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemInfo
CloseHandle
UnlockFile
WriteFile
ReadFile
LockFile
SetFilePointer
CreateFileA
GetSystemDirectoryA
FlushFileBuffers
HeapAlloc
VirtualProtect
TlsSetValue
GetProcAddress
GetModuleHandleA
GetLastError
VirtualLock
OpenFileMappingA
SetFileApisToANSI
TerminateThread
GetTickCount
SetEvent
GetPriorityClass
HeapReAlloc
GetCurrentProcess
GetLocalTime
GetCurrentThread
VirtualQuery
RtlUnwind
GetLocaleInfoA
GetStartupInfoA
GetCommandLineA
GetVersionExA
ExitProcess
TerminateProcess
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
SetLastError
GetCurrentThreadId
TlsGetValue
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
VirtualAlloc
HeapSize
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
GetClientRect
ImpersonateDdeClientWindow
MoveWindow
wsprintfA
psapi
EmptyWorkingSet
GetWsChanges
GetProcessMemoryInfo
msvfw32
DrawDibGetBuffer
Sections
.text Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 368KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 406KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ